/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | t1_reneg.c | 121 if((s->s3->previous_client_finished_len+1) > maxlen) 128 *p = s->s3->previous_client_finished_len; 131 memcpy(p, s->s3->previous_client_finished, 132 s->s3->previous_client_finished_len); 135 s->s3->previous_client_finished_len ? "Non-empty" : "Empty"); 139 *len=s->s3->previous_client_finished_len + 1; 171 if(ilen != s->s3->previous_client_finished_len) 178 if(memcmp(d, s->s3->previous_client_finished, 179 s->s3->previous_client_finished_len)) 190 s->s3 [all...] |
H A D | s3_pkt.c | 129 * The packet will be in the sub-array of s->s3->rbuf.buf specified 141 rb = &(s->s3->rbuf); 234 /* Now we have len+left bytes at the front of s->s3->rbuf.buf 288 * ssl->s3->rrec.type - is the type of record 289 * ssl->s3->rrec.data, - data 290 * ssl->s3->rrec.length, - number of bytes 306 rr= &(s->s3->rrec); 313 if (extra && !s->s3->init_extra) 326 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0); 362 if (rr->length > s->s3 [all...] |
H A D | s3_enc.c | 192 EVP_DigestUpdate(&s1,s->s3->server_random,SSL3_RANDOM_SIZE); 193 EVP_DigestUpdate(&s1,s->s3->client_random,SSL3_RANDOM_SIZE); 232 is_exp=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 233 c=s->s3->tmp.new_sym_enc; 234 m=s->s3->tmp.new_hash; 238 if (s->s3->tmp.new_compression == NULL) 241 comp=s->s3->tmp.new_compression->method; 271 if (s->s3->rrec.comp == NULL) 272 s->s3->rrec.comp=(unsigned char *) 274 if (s->s3 [all...] |
H A D | s3_both.c | 163 sender,slen,s->s3->tmp.finish_md); 166 s->s3->tmp.finish_md_len = i; 167 memcpy(p, s->s3->tmp.finish_md, i); 176 memcpy(s->s3->previous_client_finished, 177 s->s3->tmp.finish_md, i); 178 s->s3->previous_client_finished_len=i; 183 memcpy(s->s3->previous_server_finished, 184 s->s3->tmp.finish_md, i); 185 s->s3->previous_server_finished_len=i; 216 if (s->s3 [all...] |
H A D | t1_enc.c | 300 s->s3->server_random,SSL3_RANDOM_SIZE, 301 s->s3->client_random,SSL3_RANDOM_SIZE, 343 is_export=SSL_C_IS_EXPORT(s->s3->tmp.new_cipher); 344 c=s->s3->tmp.new_sym_enc; 345 m=s->s3->tmp.new_hash; 346 mac_type = s->s3->tmp.new_mac_pkey_type; 348 comp=s->s3->tmp.new_compression; 354 s->s3->tmp.new_cipher->algorithm_mkey, 355 s->s3->tmp.new_cipher->algorithm_auth, 360 fprintf(stderr,"\tkey_block: len= %d, data= ", s->s3 [all...] |
H A D | d1_pkt.c | 191 if (s->s3->rbuf.buf != NULL) 192 OPENSSL_free(s->s3->rbuf.buf); 196 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER)); 197 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD)); 200 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 229 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER)); 230 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD)); 244 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER)); 245 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD)); 322 s->s3 [all...] |
H A D | d1_srvr.c | 252 s->s3->change_cipher_spec = 0; 287 s->s3->tmp.next_state=SSL3_ST_SR_CLNT_HELLO_A; 317 memcpy(s->s3->write_sequence, s->s3->read_sequence, sizeof(s->s3->write_sequence)); 342 s->s3->tmp.next_state=SSL3_ST_SR_CLNT_HELLO_A; 354 s->s3->in_read_app_data=2; 373 s->s3->in_read_app_data=2; 426 if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) 427 && !(s->s3 [all...] |
H A D | s3_srvr.c | 197 if ((s->s3->tmp.new_cipher->algorithm_mkey & SSL_kSRP) && 303 s->s3->flags &= ~SSL3_FLAGS_SGC_RESTART_DONE; 304 s->s3->flags &= ~SSL3_FLAGS_CCS_OK; 306 s->s3->change_cipher_spec = 0; 319 else if (!s->s3->send_connection_binding && 346 s->s3->tmp.next_state=SSL3_ST_SW_HELLO_REQ_C; 420 if (!(s->s3->tmp.new_cipher->algorithm_auth & (SSL_aNULL|SSL_aKRB5|SSL_aSRP)) 421 && !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) 448 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 454 s->s3 [all...] |
H A D | t1_lib.c | 375 && !s->s3->send_connection_binding) 557 if (s->s3->client_opaque_prf_input != NULL && 560 size_t col = s->s3->client_opaque_prf_input_len; 570 memcpy(ret, s->s3->client_opaque_prf_input, col); 641 if (s->ctx->next_proto_select_cb && !s->s3->tmp.finish_md_len) 719 if (s->version == SSL3_VERSION && !s->s3->send_connection_binding) 733 if(s->s3->send_connection_binding) 797 if (s->s3->server_opaque_prf_input != NULL && 800 size_t sol = s->s3->server_opaque_prf_input_len; 810 memcpy(ret, s->s3 [all...] |
H A D | s3_lib.c | 2937 return (s->s3->rrec.type == SSL3_RT_APPLICATION_DATA) ? s->s3->rrec.length : 0; 2942 SSL3_STATE *s3; local 2944 if ((s3=OPENSSL_malloc(sizeof *s3)) == NULL) goto err; 2945 memset(s3,0,sizeof *s3); 2946 memset(s3->rrec.seq_num,0,sizeof(s3->rrec.seq_num)); 2947 memset(s3 [all...] |
/freebsd-10.0-release/libexec/rtld-aout/ |
H A D | support.c | 41 concat(const char *s1, const char *s2, const char *s3) argument 49 if (s3) 50 len += strlen(s3); 57 if (s3) 58 strcat(s, s3);
|
/freebsd-10.0-release/contrib/sendmail/libsm/ |
H A D | t-strl.c | 29 char *s1, *s2, *s3; local 37 s3 = sm_malloc_x(MAXL); 39 SM_TEST(sm_strlcpy(s3, s1, 4) == 3); 40 SM_TEST(strcmp(s1, s3) == 0); 42 SM_TEST(sm_strlcat(s3, s2, 8) == 6); 44 SM_TEST(strcmp(s3, r) == 0); 46 SM_TEST(sm_strlcpy(s3, s1, 2) == 3); 48 SM_TEST(strcmp(s3, r) == 0); 50 SM_TEST(sm_strlcat(s3, s2, 3) == 4); 52 SM_TEST(strcmp(s3, [all...] |
/freebsd-10.0-release/tools/tools/shlib-compat/test/libtest1/ |
H A D | test.c | 22 struct s3 { struct 32 int func6(char a, struct s3 *s); 63 func6(char a, struct s3 *s)
|
/freebsd-10.0-release/crypto/openssl/crypto/camellia/ |
H A D | camellia.c | 352 * adjusting n accordingly, e.g. RotLeft128(s1,s2,s3,s0,n-32). 364 register u32 s0,s1,s2,s3; local 369 k[3] = s3 = GETU32(rawKey+12); 378 k[11] = s3 = ~s1; 383 k[11] = s3 = GETU32(rawKey+28); 385 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; 389 Camellia_Feistel(s0,s1,s2,s3,SIGMA+0); 390 Camellia_Feistel(s2,s3,s0,s1,SIGMA+2); 392 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; 393 Camellia_Feistel(s0,s1,s2,s3,SIGM 489 register u32 s0,s1,s2,s3; local 538 u32 s0,s1,s2,s3; local [all...] |
/freebsd-10.0-release/sys/modules/s3/ |
H A D | Makefile | 5 KMOD= s3
|
/freebsd-10.0-release/crypto/openssl/crypto/aes/asm/ |
H A D | aes-s390x.pl | 111 $s3="%r11"; 265 llgf $s3,12($inp) 274 st $s3,12($out) 287 x $s3,12($key) 332 srlg $ra,$s3,`8-3` # i1 333 sllg $t1,$s3,`0+3` # i0 343 srlg $i3,$s3,`16-3` # i2 345 srl $s3,`24-3` 347 nr $s3,$mask 354 x $s0,1($t1,$tbl) # Te3[s3>> [all...] |
H A D | aes-armv4.pl | 41 $s3="r3"; 195 ldrb $s3,[$rounds,#15] 201 orr $s3,$s3,$t1,lsl#8 202 orr $s3,$s3,$t2,lsl#16 203 orr $s3,$s3,$t3,lsl#24 208 ldr $s3,[$rounds,#12] 213 rev $s3, [all...] |
H A D | aes-ppc.pl | 76 $s3="r11"; 371 lwz $s3,12($inp) 377 stw $s3,12($out) 409 lbz $s3,15($inp) 412 insrwi $s3,$acc12,8,0 414 insrwi $s3,$acc13,8,8 416 insrwi $s3,$acc14,8,16 441 extrwi $acc12,$s3,8,0 443 extrwi $acc13,$s3,8,8 445 extrwi $acc14,$s3, [all...] |
H A D | aes-586.pl | 200 $s3="edx"; 211 $__s3=&DWP(16,"esp"); # s3 backing store 247 &mov ($v0,$s[3]); # copy s3 264 &xor ($s[3],&DWP(0,$te,$v0,8)); # s3>>0 267 &xor ($s[2],&DWP(3,$te,$v0,8)); # s3>>8 270 &xor ($s[1],&DWP(2,$te,$v1,8)); # s3>>16 272 &xor ($s[0],&DWP(1,$te,$v0,8)); # s3>>24 308 &rotr ($s3,16); # 13,12,15,14 313 &movz ($v0,&HB($s3)); # 13,12,15*,14 320 &movz ($v0,&LB($s3)); # 1 [all...] |
/freebsd-10.0-release/contrib/nvi/catalog/ |
H A D | dump.c | 51 int ch, s1, s2, s3; local 75 TESTD(s3); 80 putchar(s3);
|
/freebsd-10.0-release/tools/tools/shlib-compat/test/libtest2/ |
H A D | test.c | 22 struct s3 { struct 33 int func6(char a, struct s3 *s); 71 func6(char a, struct s3 *s)
|
/freebsd-10.0-release/tools/tools/shlib-compat/test/libtest3/ |
H A D | test.c | 22 struct s3 { struct 44 int func6__compat(char a, struct s3 *s); 82 func6__compat(char a, struct s3 *s)
|
/freebsd-10.0-release/sys/contrib/octeon-sdk/ |
H A D | cvmx-log-arc.S | 82 sd s3, 24(sp) // Save register 83 rdhwr s3, $31 // Read the cycle count 96 dins s3, s0, 53, 11 // Overwrite the upper cycle count bits with the CVMX_LOG_TYPE_PC header 97 sd s3, 0(s2) // Write the log header 104 ld s3, 24(sp) // Restore register 128 // s0, s1, s2, s3 are already saved 161 // s0, s1, s2, s3 will be restored later
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | rijndael.c | 859 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 871 s3 = GETU32(pt + 12) ^ rk[3]; 874 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; 875 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; 876 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6]; 877 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7]; 882 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; 884 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; 885 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; 886 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 1 1040 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/aes/ |
H A D | aes_core.c | 785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 800 s3 = GETU32(in + 12) ^ rk[3]; 803 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; 804 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; 805 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6]; 806 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7]; 811 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; 813 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; 814 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; 815 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 1 976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |